Method and terminal for establishing security infrastructure and device
a technology of security infrastructure and terminal, applied in the field of payment security technology, can solve the problems of poor openness of the technical framework, and achieve the effect of improving openness
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Benefits of technology
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0059]In order to make the objects, technical solutions and beneficial effects of the invention clearer, the invention will further be illustrated below in details with reference to the drawings and the embodiments. It should be understood that the specific embodiments described herein are only used to explain the invention but not to limit the invention.
[0060]FIG. 1 exemplarily shows a flow chart of a method for establishing security infrastructure provided by an embodiment of the invention. As shown in FIG. 1, the method may include:
[0061]S101: an intermediate service organization receives an organization secret key sent by a third-party service organization.
[0062]S102: the intermediate service organization encrypts the organization secret key by a first encryption means, and sends the encrypted organization secret key to a secure storage region of a terminal.
[0063]Here, the first encryption means is to use a service private key of the intermediate service organization to sign the...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


